Chapters & Articles

All Articles

Showing 41-60 of 812

Sort by Date | Title

Page: < Prev 1 2 3 4 5 Next >

41.
Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
By Ryan Faas
Jun 16, 2006
Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
42.
Backup Basics Part 2: Demystifying Backup Media
By Ryan Faas
Jun 30, 2006
In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
43.
Backup Basics Part 3: General Tips for a Backup Strategy
By Ryan Faas
Jul 14, 2006
Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
44.
Basic Access List Configuration for Cisco Devices
By Sean Wilkins
Apr 4, 2011
This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
45.
Basic Cisco IOS Software and Catalyst 3550 Series Security
By Dmitry Bokotey, Andrew Mason, Raymond Morrow
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
46.
Basic Data Transmission in Networks: MAC Tables and ARP Tables
By Sean Wilkins
May 12, 2015
Bombarded with jargon, no wonder networking beginners get lost. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, explains some crucial terminology for anyone who needs to understand complex networking.
47.
Basic Intrusion Prevention System (IPS) Concepts and Configuration
By Sean Wilkins
Jun 29, 2011
This article looks at the current IOS device based network intrusion prevention system (NIPS).
48.
Basic IP Connectivity and Troubleshooting in Cisco Express Forwarding
By Nakia Stringfield, Stacia McKee, Russ White
Oct 26, 2007
49.
Basic IPsec VPN Topologies and Configurations
By James Henry Carmouche
Sep 29, 2006
In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
50.
Basic Layer 3 Routing Concepts
By Sean Wilkins
Oct 6, 2015
How does a message get from point A to point B on a network? Though the question may seem simple, the process isn't. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses how basic packet routing works.
51.
Basic NAT Concepts and Configuration
By Sean Wilkins
Jul 6, 2011
This article looks at some of the basic concepts that are used when configuring NAT and reviews the configuration steps required to get NAT working.
52.
Best Practices for Deploying Secure Cisco IP Telephony Solutions
By Akhil Behl
Oct 31, 2012
A brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
53.
BGP Fundamentals
By Vinit Jain, Brad Edgeworth
Jan 1, 2018

In This sample chapter from Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP, the authors cover BGP Messages and Inter-Router Communication, Basic BGP Configuration for IOS, IOS XR, and NX-OS, IBGP Rules, EBGP Rules, and BGP Route Aggregation

54.
Big Data Analytics and NetFlow
By Omar Santos
Oct 19, 2015
This chapter from Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security covers an introduction to big data analytics for cyber security, NetFlow and other telemetry sources for big data analytics for cyber security, Open Security Operations Center (OpenSOC), and understanding big data scalability.
55.
Book Review: "Deploying Wireless WANs" and Interview with Jack Unger
By Jack Unger
Mar 14, 2003
56.
Border Gateway Protocol, Route Manipulation, and IP Multicast
By Anthony Bruno, Steve Jordan
Oct 26, 2007
57.
Branch Connections
By Cisco Networking Academy
Nov 30, 2017

Broadband solutions provide teleworkers with high-speed connection options to business locations and to the Internet. In this sample chapter from Connecting Networks v6 Companion Guide, identify branch connection options for small to medium-sized businesses, basic configuration for a PPPoE connection on a client router, and more.

58.
Broadband Routers and Firewalls
By Ido Dubrawsky, Wes Noonan
Nov 17, 2006
59.
Building a Business Case for VoIP
By John Q. Walker, Jeffrey T. Hicks
Feb 23, 2004
This chapter explains how to build a business case for VoIP. It points out some of the benefits that VoIP can provide and discusses how to analyze return on investment (ROI) for VoIP implementation and management.
60.
Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
By Thierry Wohnlich
Oct 27, 2006
Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.

Page: < Prev 1 2 3 4 5 Next >